Project Summary assignment

This is a general overview of the whole project so that executives can take a glance at this section and get an idea of the project.

Sample Description: The project is to develop a telecommunications network plan for [Company Name]. The network plan is needed to deal with emerging business pressures faced by the firm. The guidance you received as director of telecommunications is to make this transition only once, within budget, of satisfactory quality, and as soon as practicable. Taking into consideration the internal and external situation, design, plan, budget, and recommend the procurement a new telecommunications network for [Company Name]. 

Fill out a one-paragraph overview of the project 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

4 Discussions.

Discussion 1.2

GeoSpatial Intelligence

What is GIS Web? 

What Tiers comprise GIS Architecture?

Discussion 2.1

GeoSpatial Intelligence

What are the 7 elements of a map?

Discussion 2.2

GeoSpatial Intelligence

What is smart mapping?

Discussion 1.1

Cyber warfare

Define Cybercrime

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

History Of java

 Research the history of Java and how it is different from procedural languages and its advantages.  Write 250 – 350 words summarizing your findings. Cite all of your sources using APA format.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Research Paper 1

 

IT infrastructure of an enterprise has:

  1. Database servers, storage systems (SAN & NAS) for data storage
  2. Computers, applications to process the data
  3. Network components to enable connectivity among computers and servers

In this research, your goal is to secure the data processed by these IT components. You will:

  • Research and analyze potential vulnerabilities and security challenges that are associated with these IT components and that eventually threatens confidentiality, integrity, and availability of data. Consider both the technical and non-technical vulnerabilities.
  • Research and analyze various security countermeasures and solutions to secure data. Think about countermeasures in policy, human, database, application, computer, storage, server, network, data, object, and application dimensions.

Action Items

  1. Write a 2-3 page APA-formatted research paper.
  2. Submit your assignment. Your work will automatically be checked by Turnitin.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Ethical Hacking – Penetration Test, Web Application analysis

1.Document the setup of the environment as you are preparing to conduct a penetration test for a customer. As described in class, do a complete recon and come up with a potential attack plan. Describe your efforts and plan in a 2-page APA6-style report (MS-Word document only) of the tools and methods that you will be using to conduct the test.

2. 
Setup and configure the system to run 3 types of Web servers on 3 different systems:  

  1. Ubuntu – Web server of your choice (i.e., Apache) – 10.10.1.11
  2. Metasploitable – already running Web services – 10.10.1.12
  3. Windows – IIS Web server. – 10.10.1.13

Use the Kali system to perform a vulnerability scan of the different Web servers to identify possible exploits.  Document up to 3 vulnerabilities for each environment.  Provide screenshots of the Oracle Virtual Machines to demonstrate the configuration.Some tips:- You don’t have to run all four systems at once, pair Kali-Ubuntu, complete tasks, shutdown Ubuntu, then Kali-Metasploitable, etc.- Make sure you don’t run out of CPU, memory, storage by overprovisioning VMs; usually 2GB and 1 or 2 cores each is enough. The suggested computer setup is 4 core CPU (8 with hyperthreading) and 16 GB RAM.- Take screenshots of Kali and target systems and include them in your submittal, along with narration of your steps and the thought process.
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week-10

 

. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week-2

 You are a member of an Information Technology team in a medium-sized organization that is implementing a new technology system that will impact employees, customers, and suppliers.  Your manager has requested that you work with the team to create a communications plan for the project.  She would like to meet with you in two hours to review your thoughts on the key objectives of the communication plan.  What should those objectives be? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment help !

 

READ EVERYTHING ! before you are able to answer the question. (also there are 2 links here, you must check them too)

According to (first link) —> The Core Rules of Netiquette Links to an external site. by Virginia Shea, Netiquette (known as “Internet etiquette”) is a catch-all term for the conventions of politeness and respect recognized in live chats, discussions, and emails.   

In online learning, Netiquette includes a set of guidelines that everyone should follow to promote appropriate online communication. Here are a few guidelines to follow when posting in online chats, discussions, and emails:

Time Management

1. Manage your time. Posting and responding to posts takes time. Sometimes it takes a few minutes, sometimes it can take hours depending on what is being asked of you or what you feel you need to post.

2. Timely Responses. Instructors can set time limits on opportunities to respond to posts so you need to check your assignment due dates and plan accordingly. Also, if you post a response and are asking for/expecting replies, check your posts frequently and reply in a timely fashion. Online this usually means within 24-48 hours.

Format

3. Descriptive Subject Headings. If you are creating a new post, then make the subject of the post make sense. It will make it easier for you and others to find later and follow. 

4. Keep It Brief and Together. If you’re going to type a long response – group it into paragraphs and keep the paragraphs about 5-6 lines or less.

5. Spelling & Grammar. There is a spell checker in the HTML editor. Use it. Also, PROOFREAD what you type.  (This also helps prevent miscommunications.) 

6. Don’t SHOUT unless you mean it. Using ALL CAPS is the equivalent of shouting online. Don’t use them unless you really mean them or want to emphasize your point. 

Social

7. Maintain a positive tone. When communicating online, we often forget that we are communicating with other human beings because we only see a computer screen. You do not see facial expressions, body language, or hear the tone of voice when you read messages. It’s easy to misinterpret your correspondent’s meaning, so always stop and think about your response before hitting submit. Always ask yourself, “Would I say that to a person’s face?”

8. Use appropriate grammar and structure. In other words, avoid using “R U” instead of “are you.” There are some students in the class that may not understand this type of communication and it does not enhance anyone’s writing or vocabulary skills. EmoticonsLinks to an external site. are fine as long as they are appropriate. A smile 🙂 is welcome, anything offensive is not.

9. Never use all CAPS. In online communication, caps are known as shouting, so refrain from using them

10. No flaming! Simply put, no personal attacks. Debates and discussions are good – they promote learning and creative thinking. Disagree with the ideas but not the person. Personal insults and attacks on character are poor form, derogatory, and may lead to disciplinary/legal action against you. So just don’t do it. 

11. We’re all human. So, give yourself, peers, and instructor the benefit of the doubt first. Sometimes we make mistakes or word things in ways that may offend others. So, if this happens, consider first that the person may not have meant it that way. If it still bothers you, try emailing or messaging the person individually for clarification and explaining why what they wrote offended you first before blasting them publicly on the forums. If you think it’s serious, inform your instructor for further action. 

12. No trolls! You’re a troll if you consciously post something to purposely incite argument and cause rife amongst your class members and then you sit back and watch the battle. The difference between trolling and debating is that trolling has the intent of causing no productive outcome other than anger and hate and debating is taking on heated discussions and loaded topics with the aim of learning a new perspective or coming to some form of resolution, agreement, or understanding. Trolls aren’t looking for enlightenment, just reactions. Trolls don’t create that “safe space” for the difference in opinions.

13. Avoid Offensive language. Cursing, racial slurs, and other types of language that would not be appropriate in a face-to-face class are also inappropriate online.

14. Respect and Common Courtesy. Be open to others’ ideas and opinions. Tolerance and respect are key to good discussions. Try to avoid sarcasm because some may just not get it and may flame you for it. “Assume the best of others in the class and expect the best from them.” (Dr. Susan Shaw)  

15. Cultural Awareness. Discussions are constructed so that they will allow you to think critically and offer theory plus opinion. There will be differences in opinions. There will be many viewpoints. Remember: Students taking online courses come from different parts of the country or even other countries. Cultural differences allow us to appreciate different perspectives.

16. Use “I” Statements. Begin your responses with an “I” statement. Express how you feel or think in your posts. Example using an “I” statement: “I feel confused when I read this paragraph. It would help me understand it better if it was separated into two paragraphs.” Instead of: “This is confusing.”   

17. Personal Commitment. You’re here to meet a goal you’ve set. Generally, that goal is to learn, meet the class requirements, and progress forward. So, make a commitment to learning about, understanding, and supporting your peers. You’re all in this course together and discussion is collaborative learning. Who knows what you might find out or who you may network with through the class discussions for that future job or community connection? 

Safety & Legal

18. No offensive or threatening posts. “Acknowledge the impact of sexism, racism, ethnocentrism, classism, heterosexism, ageism, and ableism on the lives of class members.” (Dr. Susan Shaw)   

19. No spamming. Spamming in discussion forums is like spamming in emails. No self-promotion or commercial promotion in the forums.  

20. Be Aware of What You Share. You are in an online course, but you’re still online. Alamo Colleges has safety and security measures in place to protect your student information. However, what you choose to share in discussion posts is your choice. Use good judgment and discretion. In other words, kind of like with your banking information – don’t publicly post passwords, your login information, your phone number or address in a discussion board. If you’re trying to connect with a group or another class member on a project, email them privately instead of in the forum.

A Note on Censorship

21. Posts may be censored for profanity, threatening, and/or inappropriate content by the course instructor or system administrator. Any content entered into or uploaded to the Canvas system is available for viewing and monitoring by your instructor and the system and college administrators.

????Review this video to learn more about Netiquette:

Link for the video : https://youtu.be/M6Sh6Hdsf0I

QUESTION:

Study the Netiquette website (link provided in chapter), the Online techniques, and the video.

Write 6 paragraphs (at least, 6 sentences (of 10 words or more) each paragraph) on what YOU think (your own words)  about Netiquette using 4 REFERENCES (research required here  https://www.citationmachine.net/ (Links to an external site.)   URLs do not use these parenthesis; these parenthesis are for you))  (no quotes but you can refer to 3 to 5 words in quotes and state who said that). Use WORD or Adobe to key in your work (only file formats of .doc, .docx, or .pdf will be allowed).

RUN a Spellchecker and a Grammar Checker. Watch out for errors that are not caught by a Spellchecker or Grammar Checker. Points are lost for misspelling and incorrect present, past, preterit, etc. tenses.

Minimum work, like the 6 paragraphs can only earn the highest possible grade of 70.

So as you can see 6 paragraphs is not enough to get grade of 70. 

Here is more details in order to get higher grade than 70:

DETAILS:  So on the Netiquette assignment if 6 paragraphs can only earn a 70, then 7 AMAZING paragraphs could earn an 80, 8 AMAZING paragraphs an 87 to 92, 9 AMAZING paragraphs 93 to 97, 10 AMAZING paragraphs could earn 98 to 100. But AMAZING is subjective to totally correct spelling (I receive lots of misspelled words or typos; Free Spell Checker in WORD), uninteresting info so you need interesting, no Grammar errors (I receive lots of present tense with past tense in the same paragraph/even same paragraph (Free Grammar Checker in WORD and GRAMMERLY (the free one is spectacular and even gives you little faces saying that you’re saying something negative and a smiley face – you’re saying something good or sad but holding interest), captiving words (use Thesaurus – free in WORD) to keep one/me interested. :>) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PESTEL & Five Forces

Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework. Select one of the cases from Part 2 of the Thompson (2022) textbook to analyze the six components of the Macro-Environment and the Five Forces Model. For this assignment:

Textbook:
Thompson Jr. A. A, Peteraf, M. A., Gamble, J. E., and Strickland III, A. J. (2022). Crafting & Executing Strategy: The Quest for Competitive Advantage: Concepts and Cases. 23rd Edition. McGraw-Hill. ISBN: 978-1-260-07510-6  978-1-260-73517-8 

  • Prepare a brief PESTEL Analysis for your selected case from Part 2 of our Thompson (2022) text.  You must address all six elements.
  • Prepare a brief Five Force Analysis as presented in our Thompson (2022) text for your selected case. Address all five forces.

NOTE this Requirement:  The Standard & Poor NetAdvantage Database provided in the NEC Online Library is a required source (and will be extremely helpful). The Standard & Poor Database is located under the general Library database listing. Once you have accessed the Standard & Poor site, the tabs at the top allow you to click on companies or industries. If you choose industries, it then provides a box and drop-down menu showing the various industrial reports which are available. Access the relevant report, and then review the details in the report to support this assignment. The information is incredibly relevant and provides a detailed analysis of the entire industry including a listing of the key companies in the industry.  Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate at least our course text and one non-course scholarly/peer-reviewed source in your paper.
  • Create Leve1, 2, and Level 3 APA headings for each portion of the analysis.  
  • All written assignments must include a cover page, introductory and concluding paragraphs, reference page, double-spaced, and proper in-text citations using APA guidelines.

Reference Videos:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignments

 Use the sample solution as a guide to assist you in getting started on this assignment.For this week’s assignment you will complete the following objectives:

  • Conduct research and select manual process that requires automation.
    • Your process must contain at least 2 business processes (examples are attached)
    • Each process should contain at least 4 steps
  • Design the layout of a webpage that can be used to automate these processes.
    • Draw the user interface for each process. 
    • Each process must be executed on a separate webpage
    • Underline url links and organize the layout of labels, textboxes and buttons.
  • Create a new ASP.NET Core application and create the webpages outlined in your design layout.
    • Webpages should be blank (no content)
    • All pages should contain redirect links to return to each page in the website.
  • Write a summary explaining the processes that will be automated in your website, the steps involved in designing your website, and the process of building your application shell.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now